Blog Review: Sept. 10

eSilicon’s Mike Gianfagna is searching for patterns and trends in the industry, ranging from big data and the cloud to the IoT. Check out the four V’s.

The market for wearables is gaining momentum. Apple made a huge deal out of its Apple Watch this week, but it wasn’t alone. ARM’s David Maidment is on the ground in Berlin looking at the new gear based on Android.

Cadence’s Richard Goering flags a report that paints a rosy future for EDA research and funding for the next decade and beyond—and for the application of EDA tools and methodologies into new markets.

Synopsys’ Mick Posner toasts his 20 years at the company. Once you get into EDA, it’s very hard to go back to a normal existence.

Ansys’ Justin Nescott continues to scour the landscape for engineering super-feats. This week’s luminaries: pacemakers powered by the human heart—it’s about time—and a bike that can’t be stolen because the frame serves as the lock.

ARM’s William Orme digs into ways to optimize the system interconnect, one of the most troublesome aspects of system design these days.

Cadence’s Axel Scherer highlights his first IoT device and how it changed his life…well, not quite. But it did automate an important part of it.

Mentor’s Robin Bornoff marvels at the thermal management in his six-pound laptop. It’s heavy, but it’s almost indestructible.

Ansys’ Wim Slagter poses six myths of high-performance computing. Talk power all you want, but the world is still populated with a bunch of speed freaks.

Mentor’s Doug Kolak looks at cloud-based CFD services. This kind of stuff has been suggested before. It will be interesting to see what kind of time-sharing services catch on for design engineers.

And in case you missed last week’s IoT and Security newsletter, here are some noteworthy blogs:

Technology Editor Ernest Worthman observes that no matter how vast the potential, there are some important variables that could affect profits.

Executive Editor Ann Steffora Mutschler contends that more work needs to be done to strengthen security as it relates to cell phones, but their collective power can be used for good in cryptographic research.

Rambus’ Craig Rawlings writes that trying to solve security threats with software doesn’t work because the problem is much bigger and more complex than that.